<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xhtml="http://www.w3.org/1999/xhtml">

  <!-- Blog Index -->
  <url>
    <loc>https://imca.ai/en/blog</loc>
    <xhtml:link rel="alternate" hreflang="en" href="https://imca.ai/en/blog" />
    <xhtml:link rel="alternate" hreflang="de-CH" href="https://imca.ai/de/blog" />
    <xhtml:link rel="alternate" hreflang="fr-CH" href="https://imca.ai/fr/blog" />
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url><loc>https://imca.ai/de/blog</loc><changefreq>weekly</changefreq><priority>0.7</priority></url>
  <url><loc>https://imca.ai/fr/blog</loc><changefreq>weekly</changefreq><priority>0.7</priority></url>

  <!-- Blog Posts -->
  <url><loc>https://imca.ai/en/blog/agentic-workflows-in-cybersecurity</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/why-traditional-sast-tools-miss-the-most-dangerous-code</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/cicd-integration-in-under-two-minutes</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/sast-is-not-dead</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/ai-driven-supply-chain-security</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/de/blog/ai-driven-supply-chain-security</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/fr/blog/ai-driven-supply-chain-security</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/proactive-threat-hunting-with-agentic-ai</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/de/blog/proactive-threat-hunting-with-agentic-ai</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/fr/blog/proactive-threat-hunting-with-agentic-ai</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/llm-powered-cyberattacks</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/de/blog/llm-powered-cyberattacks</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/fr/blog/llm-powered-cyberattacks</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/autonomous-ai-in-sast</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/de/blog/autonomous-ai-in-sast</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/fr/blog/autonomous-ai-in-sast</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/closing-the-cicd-security-gap</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/de/blog/closing-the-cicd-security-gap</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/fr/blog/closing-the-cicd-security-gap</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/ai-governance-for-security-teams</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/de/blog/ai-governance-for-security-teams</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/fr/blog/ai-governance-for-security-teams</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/insider-threat-detecting-malicious-code-from-within</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/de/blog/insider-threat-detecting-malicious-code-from-within</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/fr/blog/insider-threat-detecting-malicious-code-from-within</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/en/blog/what-we-found-scanning-log4j-spring-boot</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/de/blog/what-we-found-scanning-log4j-spring-boot</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://imca.ai/fr/blog/what-we-found-scanning-log4j-spring-boot</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
</urlset>
